EZPD

Password Manager

EZPD Blog Posts

  • How to defend yourself from the revival of cold boot attacks

    Recent reports have shown a decade old hacking technique—the cold boot— is back. There are some notable differences from when the attack was first discovered to today’s version. What is a cold boot attack and are there preventative measures you can take to protect yourself? What is a Cold Boot Attack? In 2008, the Princeton…

    read more

  • Study Shows User Authentication Primary Cause of Medical Devices Breaches

    As part of the “Post-Market Management of Cybersecurity in Medical Devices” written by the FDA, medical device vendors were encouraged to participate in a “threat sharing” program, where vendors report cyber vulnerabilities they’ve encountered. The findings are meant to help organizations learn more about the risks connected medical devices introduce to the health care system…

    read more

  • A Strong Password Might be Harder to Create Than You Think (Here’s Why)

    Online attacks are growing every day. Consequently, requirements for strong passwords have become more stringent. Nonetheless, they are essential for keeping your most private information safe. And, as it turns out, what you think is a strong password might actually be an easy hack. Read on to learn about what a strong password entails and what to…

    read more

  • How Thieves Are Stealing Your Tax Return

    We are in the midst of tax season. And, while we are busy collecting our w2s, 1099s and 1095s, identity thieves are equally busy scheming their next attack. Tax-related identity theft is when someone uses your Social Security number to file a tax return and fraudulently claim your refund. Tax refund fraud affects hundreds of…

    read more

  • How to Properly Define a Hacker

    When you think of a hacker, the stereotypical image is often a male operating mysteriously in a darkened room. Technically, a hacker is a skilled computer expert who leverages their technical knowledge to overcome a problem. But, the more common definition is actually about a security hacker, or when someone uses their technical knowledge to deploy bugs…

    read more

  • Using Your Smartphone as a Mobile Hotspot, is it Secure?

    For anywhere between $5 to $20 per month, depending on the provider, you can turn any park, coffee shop, beach, or bar into your office. All you need is a laptop and a smartphone with a tethering option. While many of us may consider this accessibility utopian, it can also be a surprising recipe for…

    read more


Any questions?